DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mercy Health/Love County Hospital And Clinic Patients Notified Of Medical Records Incident

Posted on December 5, 2017 by Dissent

The press release below from Mercy Health/Love County Hospital is described as a supplement to an incident that they – and we – first reported in July. In September, the entity notified HHS that they had notified 13,004 patients, a notification that they reference below as a precautionary measure. I’m not sure why they needed yet another press release about this incident unless they had failed to notify everyone as required by HITECH and wanted to ensure that they reached everyone with mitigation offer, etc. 

Dec. 5 – Mercy Health/Love County Hospital and Clinic (Love County Hospital) discovered a theft of medical records which may have affected patients receiving services from this facility. Protecting privacy and security of patient health information is very important to Love County Hospital. This news release is being issued to supplement a notice about this incident previously issued in Love County, Oklahoma.

On June 23, 2017, Love County Hospital learned that ten medical records were stolen from one of its storage units. The medical records contained medical information, names, addresses, dates of births, social security numbers and driver’s license numbers. The ten records were stolen by a former employee and used to obtain fraudulent credit cards. The matter has been investigated by multiple law enforcement agencies and Love County Hospital has been cooperating with their investigation. Upon discovering the incident, Love County Hospital took the steps necessary to address the matter, including immediate measures to enhance security of the storage units and to prevent similar incidents from happening in the future.

While only ten medical records appeared to be stolen, all individuals whose medical records were in the storage units were notified of this incident and resources were made available to assist them with protecting their information. As a precaution, affected individuals should carefully monitor their credit reports for any unauthorized activity in the upcoming months. To help protect from any potential negative consequences from this incident, all affected individuals are offered credit monitoring and identity protection services free of charge for 12 months through AllClear ID.

Love County Hospital has established a dedicated call center to answer any questions about the incident. If you have any questions or would like to learn additional information, please call 1-855-742-6046. The call center is available to answer questions Monday through Saturday, between 8:00 a.m. and 8:00 p.m. Central Time. You may also submit any questions about this incident by mail directed to: Privacy Officer, Mercy, 14528 South Outer Forty Drive, Suite 100, Office 1036, Chesterfield, MO 63017.

SOURCE: Mercy Health


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
  • Heritage Provider Network $49.99M Class Action Settlement
Category: Health DataInsiderPaperTheftU.S.

Post navigation

← MN: Colorado Center for Reproductive Medicine in Minneapolis warns clients of data breach
Iranian Hackers Have Set Up a News Outlet to Court Possible Targets, Security Firm Says →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.